The “Internet Of Everything” is the existence of uniquely identifiable devices interconnected via the Internet. The interconnection of these devices is expected to introduce automation in nearly all fields. There is a lot of hype about IoE and we are at the point of wondering what it will mean for us as individuals, employees and…

Many IT managers remain concerned about the security implications of the widespread virtualisation of mission-critical applications. Compared to non-virtualised environments, server virtualisation introduces additional points of attack, particularly in the virtualisation layer, including the hypervisor, the virtual machine environment, and the soft switches that replace the physical access-layer switches in the network. These additional layers…

If it has been a while since you contemplated buying a new laptop then it is time to look again. There are essentially three types of portables: the pure tablet (aka slate), the pure laptop or a hybrid of the two (e.g. the keyboard that flips or rotates). Your personal preference will have a large…

Organisations have done a great job of securing their mission critical data in their data centres. With measures in place such as access control, back up and DR strategies, the data centre is secure, controllable and predictable. Outside the data centre however, the picture is very different. Users always store data on laptops and desktops,…

Not all businesses are ready for public cloud solutions due to security concerns, legacy applications that don’t integrate, lack of cost benefits or other concerns. This means many organisations are looking to build a private cloud environment to host the company applications or desktops with Virtual Desktop Infrastructure (VDI). Providing the backbone of the enterprise cloud…

Have you noticed that the world of business is moving faster but your files seem to move slower? As technology improves our expectations and requirements for speed of data increase. At home, at work and on the move, we keep finding new ways to use the digital super highway and demand a better service from…

In the world of tech sorting out the fads from the game changes is tricky. Here are five trends you should follow: 1. Biometrics One day soon you’ll be able to use the ATM through retina scan and voice recognition. Smartphone developers are adding fingerprint scanners to devices, financial institutions are testing voice and facial recognition…

According to recent data, global mobile data traffic grew 81 percent in 2013 and last year’s mobile data traffic was nearly 18 times the size of the entire global Internet in 2000. Mobile devices continue their staggering growth. Smartphone usage grew 50 percent in 2013. There are now 92 million mobile-connected tablets and 22 million…

The technology landscape is changing and we are being told the Cloud is going to dominate the future of IT. There are compelling reasons to move to Cloud products that offer us cost savings and the ability to scale. What is Hybrid? Not everything can or should go to the Cloud just yet which is…

Until recently most PCs and laptops were equipped with Hard Disk Drives (HDDs) to store your computer files. Think of a HDD as similar to DVD – it works by reading/writing data onto a spinning disc that holds your data. Like a DVD, HDDs are “non-volatile” which means the data doesn’t disappear when power is…